Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 13:21

General

  • Target

    RevoUninstaller_Portable/LicenseAgreement.txt

  • Size

    6KB

  • MD5

    13d3876c402174dcd9239c60f559fa7d

  • SHA1

    1cdda259609df4c18ff13aa2f7a4e475e1ef1945

  • SHA256

    079a40fdcab2f7bedf66cd9ab26fce42d2057ef899eba7fb367d9f6981b30267

  • SHA512

    8e8e04401c5a4637d110d4ad718321f027cb39f1a366e021584f657dbe30c01384f60a82ddaf6ff2e4291f8354d026723515b0029059f064a17ca7d44d0fae6f

  • SSDEEP

    96:oxfbLEJB34LGPy2ZJ4bTw7aw4ri2q9uCosEt+i4B7KVrVHBhyo/fKhwsi:onLs3fLbnEtj+7gZH3Z/Ch2

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\RevoUninstaller_Portable\LicenseAgreement.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:3112
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3136
    • C:\Users\Admin\AppData\Local\Temp\RevoUninstaller_Portable\RevoUPort.exe
      "C:\Users\Admin\AppData\Local\Temp\RevoUninstaller_Portable\RevoUPort.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3504
      • C:\Users\Admin\AppData\Local\Temp\RevoUninstaller_Portable\x64\RevoUn.exe
        C:\Users\Admin\AppData\Local\Temp\RevoUninstaller_Portable\x64\RevoUn.exe
        2⤵
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --uninstall --system-level
          3⤵
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3416
          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x288,0x28c,0x290,0x264,0x294,0x7ff7a4fe4698,0x7ff7a4fe46a4,0x7ff7a4fe46b0
            4⤵
            • Drops file in Program Files directory
            • Suspicious use of SetWindowsHookEx
            PID:4040
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --uninstall
            4⤵
            • Enumerates system info in registry
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1568
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff80fd9cc40,0x7ff80fd9cc4c,0x7ff80fd9cc58
              5⤵
                PID:2364
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1836,i,10390415362906672489,8255916446234031415,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1816 /prefetch:2
                5⤵
                  PID:4744
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,10390415362906672489,8255916446234031415,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2140 /prefetch:3
                  5⤵
                    PID:4036

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

            Filesize

            99KB

            MD5

            48a1fbd66264e8cffca58675ce94e60b

            SHA1

            b0e202a786c76ccf8e364bc92c30a10e3ae2b634

            SHA256

            5c2ecefb4d06774ebc651b69aff35c10098ff4546a85d6444b6cc46fdedbb1da

            SHA512

            53efdacfc765cd5f13f25cbe77f08946c9b7d858fd349da9b4ce5c5c3c35c97a89e49048045aabe4392e916ce2502cdf956eadc501ce5cea75b46d69749b098f

          • C:\Users\Admin\AppData\Local\Temp\RevoUninstaller_Portable\settings.ini

            Filesize

            3KB

            MD5

            e8dd6bfec9511bf1c31cb9c68a85b8b2

            SHA1

            daeb0a5890d9c35aaa3642ec4df1673e471b83c7

            SHA256

            cb7a03fbeef81ecfd4554adcff489ea4b1a0474b20acb6d94e601141c239c671

            SHA512

            05f60766afe6c12f708cb07aa1d3a57b5c21f7d0848bae655a495b4207d5d31c7af3ccb37ed0db34b1a9c5bbd139aadf0a077b46a75cedab56f0a5aaf525ddd6